{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:11:24Z","timestamp":1748664684381,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319239811"},{"type":"electronic","value":"9783319239835"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23983-5_23","type":"book-chapter","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T14:56:04Z","timestamp":1443452164000},"page":"243-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Tampering Detection in Low-Power Smart Cameras"],"prefix":"10.1007","author":[{"given":"Adriano","family":"Gaibotti","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Marchisio","sequence":"additional","affiliation":[]},{"given":"Alexandro","family":"Sentinelli","sequence":"additional","affiliation":[]},{"given":"Giacomo","family":"Boracchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,22]]},"reference":[{"issue":"2","key":"23_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2005.1406476","volume":"22","author":"A Hampapur","year":"2005","unstructured":"Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Processing Magazine 22(2), 38\u201351 (2005)","journal-title":"IEEE Signal Processing Magazine"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Aksay, A., Temizel, A., Cetin, A.E.: Camera tamper detection using wavelet analysis for video surveillance. In: IEEE Int. Conf. on Advanced Video and Signal Based Surveillance, AVVS 2007, pp. 558\u2013562. IEEE (2007)","DOI":"10.1109\/AVSS.2007.4425371"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Saglam, A., Temizel, A.: Real-time adaptive camera tamper detection for video surveillance. In: Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, pp. 430\u2013435. IEEE (2009)","DOI":"10.1109\/AVSS.2009.29"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-540-73055-2_24","volume-title":"Nature Inspired Problem-Solving Methods in Knowledge Engineering","author":"P Gil-Jim\u00e9nez","year":"2007","unstructured":"Gil-Jim\u00e9nez, P., L\u00f3pez-Sastre, R.J., Siegmann, P., Acevedo-Rodr\u00edguez, J., Maldonado-Basc\u00f3n, S.: Automatic control of video surveillance camera sabotage. In: Mira, J., \u00c1lvarez, J.R. (eds.) IWINAC 2007. LNCS, vol. 4528, pp. 222\u2013231. Springer, Heidelberg (2007)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Tsesmelis, T., Christensen, L., Fihl, P., Moeslund, T.B.: Tamper detection for active surveillance systems. In: IEEE Int. Conf. on Advanced Video and Signal Based Surveillance, AVVS 2013, pp. 57\u201362 (2013)","DOI":"10.1109\/AVSS.2013.6636616"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11744023_32","volume-title":"Computer Vision \u2013 ECCV 2006","author":"H Bay","year":"2006","unstructured":"Bay, H., Tuytelaars, T., Van Gool, L.: SURF: speeded up robust features. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part I. LNCS, vol. 3951, pp. 404\u2013417. Springer, Heidelberg (2006)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Ribnick, E., Atev, S., Masoud, O., Papanikolopoulos, N., Voyles, R.: Real-time detection of camera tampering. In: IEEE Int. Conf. on Video and Signal Based Surveillance, AVSS 2006, pp. 10\u201310 (2006)","DOI":"10.1109\/AVSS.2006.94"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Harasse, S., Bonnaud, L., Caplier, A., Desvignes, M.: Automated camera dysfunctions detection. In: IEEE Southwest Symp. on Image Analysis and Interpretation, pp. 36\u201340 (2004)","DOI":"10.1109\/IAI.2004.1300940"},{"key":"23_CR9","unstructured":"Komorkiewicz, T.K.M., Gorgon, M.: FPGA implementation of camera tamper detection in real-time. In: Int. Conf. on Design and Architectures for Signal and Image Processing DASIP, pp. 1\u20138 (2012)"},{"issue":"6","key":"23_CR10","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53\u201357 (2004)","journal-title":"Communications of the ACM"},{"issue":"11","key":"23_CR11","doi-asserted-by":"publisher","first-page":"2982","DOI":"10.1109\/TIM.2010.2047129","volume":"59","author":"C Alippi","year":"2010","unstructured":"Alippi, C., Boracchi, G., Camplani, R., Roveri, M.: Detecting external disturbances on the camera lens in wireless multimedia sensor networks. IEEE Trans. on Instr. and Meas. 59(11), 2982\u20132990 (2010)","journal-title":"IEEE Trans. on Instr. and Meas."},{"issue":"3","key":"23_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys (CSUR) 41(3), 15 (2009)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Gustafsson, F.: Adaptive Filtering and Change Detection. Wiley, October 2000","DOI":"10.1002\/0470841613"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P., Susstrunk, S.: Slic superpixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 34(11), November","DOI":"10.1109\/TPAMI.2012.120"},{"issue":"11","key":"23_CR15","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/34.334394","volume":"16","author":"DP Kottke","year":"1994","unstructured":"Kottke, D.P., Sun, Y.: Motion estimation via cluster matching. IEEE Transactions on Pattern Analysis and Machine Intelligence 16(11), 1128\u20131132 (1994)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"23_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/03610927408827101","volume":"3","author":"T Cali\u0144ski","year":"1974","unstructured":"Cali\u0144ski, T., Harabasz, J.: A dendrite method for cluster analysis. Communications in Statistics-theory and Methods 3(1), 1\u201327 (1974)","journal-title":"Communications in Statistics-theory and Methods"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23983-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T20:56:19Z","timestamp":1748638579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23983-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319239811","9783319239835"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23983-5_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"22 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}